On Sun, Mar 17, 2024 at 5:32 PM Richard Barnes <r...@ipv.sx> wrote:
>
> Hi Watson,
>
> I appreciate the concerns with regard to re-using Web PKI certs for cases 
> such as these.  Care is required, but I think there is a path here.
>
> 1. Clearly there are cross-protocol concerns.  I expect that most usage here 
> in reality would be based on ECDSA / EdDSA, not RSA, which helps.  I would be 
> comfortable with security considerations recommending that a key pair / 
> certificate used for signing these things be used for no other purpose.
>
> 2. Validity times are definitely a challenge for the container signing use 
> case, but from the conversations I've had with that community, they are 
> taking an orthogonal approach.  As I tried to sketch in the document, they 
> are establishing authorities that will vouch that a signed thing existed at a 
> given time, so that a relying party can safely rewind their clock and 
> validate as if it were that time.  See, e.g., SigStore 
> <https://www.sigstore.dev/>, which has roughly this shape if you squint right.

That should work out: might want a security considerations saying this.

>
> 3. I don't think there's actually any disconnect between HTTPS authentication 
> and proof of authority.  The Web PKI is about authenticating domain names, 
> which is what both use cases require.

Only with certain validation methods. Others like agreed upon change
to site content have a narrower scope and the BRs reflect this
subtlety. To be honest you're probably safe and I am not the expert
here.

Sincerely,
Watson

--
Astra mortemque praestare gradatim

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to